Strengthening Existing Internet of Things System Security: Case Study of Improved Security Structure in Smart Health

被引:1
|
作者
Chang, Chih-Wei [1 ]
Hung, Wei-Hsi [1 ]
机构
[1] Natl Chengchi Univ, Dept Management Informat Syst, 64,Sec 2,Zhi Nan Rd, Taipei 116, Taiwan
关键词
Internet of things; IoT security; cybersecurity; Internet of health things; smart health; NETWORK;
D O I
10.18494/SAM.2021.3163
中图分类号
TH7 [仪器、仪表];
学科分类号
0804 ; 080401 ; 081102 ;
摘要
Sensor applications and Internet of Things (IoT) technology using many sensors and smart devices (IoT devices) have been commercially implemented and are significantly changing our daily lives. However, most IoT devices are vulnerable due to low power consumption and have inadequate physical security protection mechanisms. The information security protection of existing sensors is very limited, particularly when large numbers of smart devices are deployed in smart application systems. This limited protection is a major information security concern and has become an important personal privacy issue. The study of the IoT architecture and security taxonomy in the beginning of this paper will help readers understand our proposed concept for improving the security level of existing systems without taking down the whole deployed system, which is the key contribution of this article. Through an actual case study, we have found that by improving the network planning and security management mechanism and applying network segmentation, monitoring, filtering, and IoT trust connection, we can strengthen the security protection of existing IoT systems. We demonstrated that raising the security level of existing smart health systems will increase market value both now and in the future, and ad hoc IoT security solutions can be feasibly deployed in all sensor application fields.
引用
收藏
页码:1257 / 1272
页数:16
相关论文
共 50 条
  • [1] Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System
    Ling, Zhen
    Luo, Junzhou
    Xu, Yiling
    Gao, Chao
    Wu, Kui
    Fu, Xinwen
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 1899 - 1909
  • [2] A Study of Security Threat for Internet of Things in Smart Factory
    Chai, Tze Uei
    Goh, Hock Guan
    Ponnusamy, Vasaki
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING (ICOCO), 2021, : 97 - 102
  • [3] Security Analysis of Internet-of-Things: A Case Study of August Smart Lock
    Ye, Mengmei
    Jiang, Nan
    Yang, Hao
    Yan, Qiben
    2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2017, : 499 - 504
  • [4] Smart Security System for Businesses using Internet of Things (IoT)
    Mahendra, Santosh
    Sathiyanarayanan, Mithileysh
    Vasu, Rajesh Babu
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT 2018), 2018, : 424 - 429
  • [5] Internet of Things Cyber Security: Smart Door Lock System
    Pavelic, Marko
    Loncaric, Zvonimir
    Vukovic, Marin
    Kusek, Mario
    2018 INTERNATIONAL CONFERENCE ON SMART SYSTEMS AND TECHNOLOGIES (SST), 2018, : 227 - 232
  • [6] Internet of Things Security Analysis of Smart Campus
    Wang, Lei
    Li, Kunqin
    Chen, Xianxiang
    CLOUD COMPUTING AND SECURITY, PT V, 2018, 11067 : 418 - 428
  • [7] Internet of Things: Existing Protocols and Technological Challenges in Security
    Sardeshmukh, Harshal
    Ambawade, Dayanand
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [8] General Theory of Security and a Study Case in Internet of Things
    Yang, Yixian
    Peng, Haipeng
    Li, Lixiang
    Niu, Xinxin
    IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02): : 592 - 600
  • [9] Internet-of-Things Security and Vulnerabilities: Case Study
    Alqarawi, Ghaida
    Alkhalifah, Bashayer
    Alharbi, Najla
    El Khediri, Salim
    JOURNAL OF APPLIED SECURITY RESEARCH, 2023, 18 (03) : 559 - 575
  • [10] Internet of Things Information System Security for Smart Devices Identification and Authentication
    Savukynas, Raimundas
    2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 168 - 172